Query-efficient decision-based adversarial attack with low query budget. [PDF]
Tuo Y, Yin M, Che S.
europepmc +1 more source
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks [PDF]
Felix Assion +6 more
openalex +1 more source
Words After the Storm: Elite Rhetoric and the Limits of De‐Escalation in Postreferendum Catalonia
ABSTRACT When does a secessionist crisis end? What drives political elites to shift from hostility to moderation? This article examines the prospects of rhetorical de‐escalation in the aftermath of a secessionist dispute through the paradigmatic case of Catalonia.
Daniel Cetrà +3 more
wiley +1 more source
Adversarial attack of sequence-free enhancer prediction identifies chromatin architecture. [PDF]
Gafur J, Lang OW, Lai WKM.
europepmc +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Gradual poisoning of a chest x-ray convolutional neural network with an adversarial attack and AI explainability methods. [PDF]
Lee SB.
europepmc +1 more source
ABSTRACT Artificial intelligence (AI) is increasingly used in public decision‐making; yet existing governance tools often lack clear definitions of harm and benefit, practical methods for weighing competing values, and guidance for resolving value conflicts.
Karl de Fine Licht, Anna Folland
wiley +1 more source
Hard label adversarial attack with high query efficiency against NLP models. [PDF]
Qiu S +6 more
europepmc +1 more source
ABSTRACT How do the strategies that governments employ when they encounter crisis‐induced turbulence affect the robustness of the political regime in which they operate? Comparative studies of the connection between government strategies and political regime robustness under different cultural and institutional conditions are few and far between.
Eva Sørensen +5 more
wiley +1 more source
Identifying significant features in adversarial attack detection framework using federated learning empowered medical IoT network security. [PDF]
Sharaf SA, Nooh S.
europepmc +1 more source

